Indistinguishability obfuscation (Q6198645): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
Normalize DOI.
 
(2 intermediate revisions by 2 users not shown)
Property / DOI
 
Property / DOI: 10.4171/icm2022/86 / rank
Normal rank
 
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.4171/icm2022/86 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W4389774917 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multilinear Maps from Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Compact Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pseudorandom Generators with Long Stretch and Low Locality from Random Local One-Way Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Arithmetic Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-key cryptography from different assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Dichotomy for Local Small-Bias Generators / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure arithmetic computation with constant computational overhead / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic attacks against random local functions and their countermeasures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Limits on low-degree pseudorandom generators (or: sum-of-squares meets program obfuscation) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protecting Obfuscation against Algebraic Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sum-of-squares meets program obfuscation, revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783716 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5875789 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Function-Hiding Inner Product Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: From Cryptomania to Obfustopia Through Secret-Key Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341754 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of Goldreich's one-way function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption: Definitions and Challenges / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Does co-NP have short interactive proofs ? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Obfuscation of Probabilistic Circuits and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the Multilinear Map over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Goldreich’s One-Way Function Candidate and Myopic Backtracking Algorithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: The complexity of theorem-proving procedures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Multilinear Maps over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the concrete security of Goldreich's pseudorandom generator / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4779150 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Graded encoding schemes from obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Multilinear Maps from Ideal Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Maliciously secure oblivious linear function evaluation with constant overhead / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Non-interactive Proof Systems for Bilinear Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737161 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3549728 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Founding Cryptography on Oblivious Transfer – Efficiently / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from well-founded assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secret-Sharing for NP / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sum of squares lower bounds for refuting any CSP / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation with Non-trivial Efficiency / rank
 
Normal rank
Property / cites work
 
Property / cites work: Output-Compressing Randomized Encodings and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from trilinear maps and block-wise local PRGs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Limits on the locality of pseudorandom generators and applications to indistinguishability obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hardness of SIS and LWE with Small Parameters / rank
 
Normal rank
Property / cites work
 
Property / cites work: Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to use indistinguishability obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Identity-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3250141 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional encryption for quadratic functions from \(k\)-lin, revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.4171/ICM2022/86 / rank
 
Normal rank

Latest revision as of 19:23, 30 December 2024

scientific article; zbMATH DE number 7821711
Language Label Description Also known as
English
Indistinguishability obfuscation
scientific article; zbMATH DE number 7821711

    Statements

    Indistinguishability obfuscation (English)
    0 references
    0 references
    0 references
    0 references
    20 March 2024
    0 references
    Summary: At least since the initial public proposal of public-key cryptography based on computational hardness conjectures [\textit{W. Diffie} and \textit{M. E. Hellman}, IEEE Trans. Inf. Theory 22, 644--654 (1976; Zbl 0435.94018)], cryptographers have contemplated the possibility of a ``one-way compiler'' that translates computer programs into ``incomprehensible'' but equivalent forms. And yet, the search for such a ``one-way compiler'' remained elusive for decades. We examine a formalization of this concept with the notion of indistinguishability obfuscation (\(i \mathcal{O}\)). Roughly speaking, \(i \mathcal{O}\) requires that the compiled versions of any two equivalent programs (with the same size and running time) be indistinguishable to any efficient adversary. Finally, we show how to construct \(i \mathcal{O}\) in such a way that we can prove the security of our \(i \mathcal{O}\) scheme based on well-studied computational hardness conjectures in cryptography. For the entire collection see [Zbl 07816360].
    0 references
    indistinguishability obfuscation
    0 references
    well-studied assumptions
    0 references
    learning parity with noise
    0 references
    pairing groups
    0 references
    pseudorandom generators
    0 references
    learning with errors
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references